Остановите войну!
for scientists:
default search action
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by access
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 82 matches
- 2018
- Hala Alsalloum, Ali El Masri, Leïla Merghem-Boulahia, Rana Rahim:
Demand Side Management in Smart Grids: A Stackelberg Multi Period Multi Provider Game. NTMS 2018: 1-5 - Sarah Abdallah, Imad H. Elhajj, Ali Chehab, Ayman I. Kayssi:
A Network Management Framework for SDN. NTMS 2018: 1-4 - Tesnim Abdellatif, Kei-Léo Brousmiche:
Formal Verification of Smart Contracts Based on Users and Blockchain Behaviors Models. NTMS 2018: 1-5 - Alexander Adli:
Star Projection Technologies in the Modern Planetarium Industry. NTMS 2018: 1-4 - Zeeshan Afzal, Johan Garcia, Stefan Lindskog, Anna Brunström:
Slice Distance: An Insert-Only Levenshtein Distance with a Focus on Security Applications. NTMS 2018: 1-5 - Daniel AlShamaa, Farah Mourad-Chehade, Paul Honeine:
Localization of Sensors in Indoor Wireless Networks: An Observation Model Using WiFi RSS. NTMS 2018: 1-5 - Daniel AlShamaa, Farah Mourad-Chehade, Paul Honeine:
Mobility-based Tracking Using WiFi RSS in Indoor Wireless Sensor Networks. NTMS 2018: 1-5 - Hesham H. Alsaadi, Monther Aldwairi, May Al Taei, Mansoor AlBuainain, Maktoom AlKubaisi:
Penetration and Security of OpenSSH Remote Secure Shell Service on Raspberry Pi 2. NTMS 2018: 1-5 - Amjad Alsirhani, Srinivas Sampalli, Peter Bodorik:
DDoS Attack Detection System: Utilizing Classification Algorithms with Apache Spark. NTMS 2018: 1-7 - Andra Anoaica, Hugo Levard:
Quantitative Description of Internal Activity on the Ethereum Public Blockchain. NTMS 2018: 1-5 - Mikael Asplund, Jakob Lovhall, Simin Nadjm-Tehrani:
In-Store Payments Using Bitcoin. NTMS 2018: 1-6 - Bouchaib Assila, Abdellatif Kobbane, Mohammed El Koutbi:
A Many-To-One Matching Game Approach to Achieve Low-Latency Exploiting Fogs and Caching. NTMS 2018: 1-2 - Eyuel Debebe Ayele, Nirvana Meratnia, Paul J. M. Havinga:
MANER: Managed Data Dissemination Scheme for LoRa IoT Enabled Wildlife Monitoring System (WMS). NTMS 2018: 1-7 - Eyuel Debebe Ayele, Nirvana Meratnia, Paul J. M. Havinga:
Towards a New Opportunistic IoT Network Architecture for Wildlife Monitoring System. NTMS 2018: 1-5 - Mahesh Balaji, Aswani Kumar Cherukuri:
Inter-Application Based Resource Management Approach for Cloud Infrastructure. NTMS 2018: 1-6 - Gianmarco Baldini, Raimondo Giuliani, Claudio Gentile, Gary Steri:
Measures to Address the Lack of Portability of the RF Fingerprints for Radiometric Identification. NTMS 2018: 1-5 - Brahim Benaissa, Filip Hendrichovsky, Kaori Yishida, Mario Köppen, Peter Sincak:
Phone Application for Indoor Localization Based on Ble Signal Fingerprint. NTMS 2018: 1-5 - Keltoum Bendiab, Stavros Shiaeles, Samia Boucherkha:
A New Dynamic Trust Model for "On Cloud" Federated Identity Management. NTMS 2018: 1-5 - Eirik Bertelsen, Gabriel Berthling-Hansen, Trude Hafsøe Bloebaum, Christian Duvholt, Einar Hov, Frank T. Johnsen, Eivind Morch, Andreas H. Weisethaunet:
Federated Publish/Subscribe Services. NTMS 2018: 1-5 - Hana Bouafif, Faouzi Kamoun, Farkhund Iqbal, Andrew Marrington:
Drone Forensics: Challenges and New Insights. NTMS 2018: 1-6 - Christos Bouras, Nikolaos Kanakis:
Evolving AL-FEC Application Towards 5G NGMN. NTMS 2018: 1-5 - François Boutigny, Stéphane Betgé-Brezetz, Hervé Debar, Grégory Blanc, Antoine Lavignotte, Ion Popescu:
Multi-Provider Secure Virtual Network Embedding. NTMS 2018: 1-5 - Andreas Brokalakis, Ioannis Chondroulis, Ioannis Papaefstathiou:
Extending the Forward Error Correction Paradigm for Multi-Hop Wireless Sensor Networks. NTMS 2018: 1-5 - Kei-Léo Brousmiche, Thomas Heno, Christian Poulain, Antoine Dalmieres, Elyes Ben Hamida:
Digitizing, Securing and Sharing Vehicles Life-cycle over a Consortium Blockchain: Lessons Learned. NTMS 2018: 1-5 - S. Lirio Castellanos-Lopez, Felipe A. Cruz-Pérez, Genaro Hernández-Valdez, Jose Raul Miranda-Tello:
Performance Analysis of Mobile Cellular Networks with MMPP Call Arrival Patterns. NTMS 2018: 1-6 - Emanuele Catania, Aurelio La Corte:
Location Privacy in Virtual Cell-Equipped Ultra-Dense Networks. NTMS 2018: 1-4 - Felipe A. Cruz-Pérez, Jose Serrano-Chavez, S. Lirio Castellanos-Lopez, Genaro Hernández-Valdez:
Comparison of the Performance Sensitivity to the Primary and Secondary Service Time Distribution in Cognitive Radio Networks. NTMS 2018: 1-4 - Francesco D'Andria, Jose Miguel Garrido, Michael J. Boniface, Stefano Modafferi, Simon Crowle, Lee Middleton, Konstantinos C. Apostolakis, Kosmas Dimitropoulos, Petros Daras:
ProsocialLearn: A Prosocial Games Marketplace. NTMS 2018: 1-5 - Sajjad Dadkhah, Mario Koeppen, Somayeh Sadeghi, Kaori Yoshida:
Bad Ai: Investigating the Effect of Half-Toning Techniques on Unwanted Face Detection Systems. NTMS 2018: 1-5 - Hachemi Nabil Dellys, Karima Benatchba, Layth Sliman, Yen-Wei Chen:
Chaff-Points Generation Method Based on Adaptive Genetic Algorithms and Non-Fixed Size Squares Boundaries for Resource Constrained Devices. NTMS 2018: 1-4
skipping 52 more matches
loading more results
failed to load more results, please try again later
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
retrieved on 2024-05-23 04:16 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint